Remote Working Technology Checklist

By Bill Bernard, VP, Security & Content Strategy

Estimated Reading Time: 4 minutes

Our customers have reached out to us lately to learn the basics of setting up a remote workforce for success. We pulled together the Telecommunity Technology Checklist for you to utilize to get rolling securely and successfully.

Company Provided Technologies

TechnologyBest Practice
Laptops or ChromebooksYou can’t secure the endpoint if you don’t own the endpoint. Remote access solutions are ok for occasional use, but if you want to have any control over securing the endpoint you need to deploy something you can manage and/or put endpoint software on.
Dock and Monitor(s)Workers used to a docking station and additional screen real estate may find that working from that 13” laptop screen isn’t effective for them.
Endpoint AgentsAnti Virus, Data Loss Prevention, etc. need to be able to update and report without being on a VPN connection. Hopefully that means they report to a cloud solution, because otherwise that’s a new hole in your perimeter.
DNS SolutionOne of the lightest weight, lowest impact ways to prevent malicious communications to and from your remote worker’s systems is a DNS solution forcing all DNS lookups to your approved (and protected) DNS solution. Otherwise you’re assuming the DNS solution your remote workers are pointing to is trustworthy, not necessarily a safe assumption.
Multi-factor w/o physical tokensDistributing multi-factor authorization (MFA) credentials based on software (phone apps come to mind) is going to be far easier to deploy at scale than ones that rely on tokens or keys.
Single Sign-On SolutionThe best way to make MFA work well and to be flexible about connecting to systems in your data centers and the cloud.
Collaboration SoftwareSupports chat, ad-hoc meetings, scheduled meetings, and all-hands webinars will be critical to keeping your workers communicating with each other and with your customers.
E-Signature SolutionIf you don’t want people printing, signing, and scanning documents you’re going to need to deploy an e-signature solution.

Employee Provided Technologies

TechnologyBest Practice
Up-to-date Internet RouterYour home is now the company perimeter. Is your home router up to date? Have you ever updated the firmware on it? Changed the default password? Is it so old the plastic is turning yellow and getting brittle? Might be time to update the hardware, and/or the software.
Cellular Internet BackupThose ISP’s are good, but they’re not perfect. Your home internet will go down once in a while, so have a cellular based backup. Sure it will be slower (until 5G really shows up), but know how to tether to your phone, or a hotspot
WebcamThe cam on your laptop might be good enough for occasional use, but if you’re going to be working from home heavily you’ll need a webcam. If you want to get fancy you could add a green screen as well, handy when the view behind you is of your kids playroom or the pile of dishes on the countertop.
HeadsetThe microphone and speakers on your computer are also for occasional use and not going to suit your needs as a full-time remote worker. Wireless headsets allow you the most freedom, and nicer ones can connect to your laptop, phone, and even (gasp) landline phone if you still have one of those. Pay attention to battery life concerns as well.
Uninterrupted Power SupplyIf you live somewhere where the lights flicker once in a while, or you get 5-15 minute power interruptions you will want to make sure that your networking gear, monitor, etc. is connected to a battery backup system. Your laptop has a battery built in, but if those other things lose power you’re going to be stuck until they get powered back up.
Printer &  ScannerWe use these less and less these days, but sometimes you have to print, sign, and return a document. Just make sure you’re properly storing and disposing of any company materials you print out (cross-cut shredder).

In Closing

If you would like to learn how to run a remote security team or general work from home best practices, please feel free to reach out to us anytime. We’re here to help.

Bill-Bernard-Headshot

Bill Bernard, VP, Security & Content Strategy

Bill Bernard is a seasoned security expert with 20+ years of experience collaborating with customers to select and deploy the right security solutions for their business. Bill has held various solutions architecture roles throughout his career and holds a variety of security certifications including CISSP, CIPP-E and CIPM.

Read Posts

Share

LinkedIn Twitter YouTube

Subscribe to the Deepwatch Insights Blog